Patent classifications
H04L69/04
Header compression handling during handover
Aspects of the present disclosure relate to wireless communications, and more particularly, handling header compression in scenarios with concurrent connections, such as make-before-break (MBB) handover or dual connectivity (DC) scenarios. A method of wireless communication performed by a user equipment (UE) can include concurrently communicating with a first base station (BS) on a connection with the first BS and with a second BS on a connection with the second BS during a handover procedure. The UE maintains a context for a header compression protocol for the connection with the first BS and the connection with the second BS. The concurrently communicating includes using the header compression protocol context for sending one or more packets, receiving one or more packets, or both.
WIRELESS DATA LINK LAYER COMPRESSION AND DECOMPRESSION
A method of processing data frames for transmission on a wireless access interface of a wireless communications system, the method comprising receiving a first data frame comprising a first protocol header, the first protocol header associated with a medium access control (MAC) frame format for data transmission within a local area network (LAN), applying header compression in accordance with a header compression context to the first data frame by compressing one or more protocol header fields of the first protocol header to form a first compressed data frame for transmission on the wireless access interface, receiving a second data frame comprising a second protocol header associated with the MAC frame format, and determining that none of the fields of the second protocol header are to be compressed in accordance with the header compression context before the second data frame is transmitted on the wireless access interface.
METHODS AND SYSTEMS FOR REDUCING FRONTHAUL BANDWIDTH IN A WIRELESS COMMUNICATION SYSTEM
The present disclosure relates to a pre-5.sup.th-Generation (5G) or 5G communication system to be provided for supporting higher data rates Beyond 4.sup.th-Generation (4G) communication system such as Long Term Evolution (LTE). The present disclosure provides methods and systems for reducing fronthaul bandwidth. Embodiments herein relate to the field of wireless networks and more particularly to reducing fronthaul bandwidth during a transfer of data between at least one radio node and at least one centralized node in a wireless network. A method disclosed herein includes determining parameters specific to at least one User Equipment (UE) using a machine learning method. The method further includes transferring data between the at least one radio node and the at least one centralized node over a fronthaul link by compressing the data using the parameters that are determined using the machine learning method. The method further includes decompressing, by at least one of the at least one radio node and the at least one centralized node, the compressed data using the parameters that are determined using the machine learning method.
SEGMENT ROUTING HEADER COMPRESSION METHOD AND APPARATUS, SERVICE PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE AND COMPUTER-READABLE MEDIUM
An embodiment of the present disclosure relates to segment routing header compression method and apparatus, service processing method and apparatus, computer device and computer-readable medium. The segment routing header compression method includes: configuring a regular compression segment identification for respective nodes on a segment routing path and configuring an extended compression segment identification for at least one of nodes on the segment routing path; generating a segment list which includes the regular compression segment identification of the respective nodes and the extended compression segment identification of the at least one of the nodes, in the segment list, the extended compression segment identification of the at least one of the nodes being adjacent to and located after the regular compression segment identification of the at least one of the nodes; and carrying the segment list in a segment routing header of a service message.
Reestablishment of lost radio link between user equipment and source node using cryptographic verification based on a secret key
For each target cell determined by a handover decision process, a first message is transmitted from a source base station (20S) to a target base station (20T) servicing that target cell. The first message includes an identifier of a wireless device (10) having a communication link with the source base station and information for obtaining authentication data for this wireless device. The authentication data depends on a secret key available to the wireless device and the source base station and on an identity of the target cell. Upon failure of the communication link, a cell is selected at the wireless device, which transmits to that cell a reestablishment request message including its identifier and authentication data depending on the secret key and on an identity of the selected cell. If the selected cell is a target cell serviced by a target base station that received a first message, conformity of the authentication data included in the reestablishment request message with the authentication data obtained from this first message is verified to authorize transfer of the communication link to the selected cell.
Reestablishment of lost radio link between user equipment and source node using cryptographic verification based on a secret key
For each target cell determined by a handover decision process, a first message is transmitted from a source base station (20S) to a target base station (20T) servicing that target cell. The first message includes an identifier of a wireless device (10) having a communication link with the source base station and information for obtaining authentication data for this wireless device. The authentication data depends on a secret key available to the wireless device and the source base station and on an identity of the target cell. Upon failure of the communication link, a cell is selected at the wireless device, which transmits to that cell a reestablishment request message including its identifier and authentication data depending on the secret key and on an identity of the selected cell. If the selected cell is a target cell serviced by a target base station that received a first message, conformity of the authentication data included in the reestablishment request message with the authentication data obtained from this first message is verified to authorize transfer of the communication link to the selected cell.
Techniques for improving data transmission in teleoperation systems
Techniques for improving data transmission in teleoperation systems including a method for dynamic packet routing. The method includes identifying an optimal channel of a plurality of channels based on a network connectivity status of a system and historical connectivity data related to a current location of the system, wherein the system includes a plurality of network authorization devices, wherein each network authorization device is configured to enable communications via an associated channel; and routing packets to the optimal channel using a network authorization device of the plurality of network authorization devices that is associated with the optimal channel.
System and method for managing built-in security for content distribution
A system is configured for managing a plurality of files containing sensitive information associated with an organization to be sent to a particular receiver. The system is further configured to determine whether the particular receiver is an internal receiver or an external receiver with respect to the organization. If the particular receiver is an external receiver, a CRC code generated from the personal information and location coordinates of an external server where the plurality of files will be accessed is added to the plurality of files. A security code is also added to the plurality of files to facilitate that they are secured from being exposed and disposed at a retention time set by the organization. The system generates a custom compressed file from the plurality of files, configures it to be decompressed by the personal information of the external receiver, and sends it to the external receiver.
System and method for managing built-in security for content distribution
A system is configured for managing a plurality of files containing sensitive information associated with an organization to be sent to a particular receiver. The system is further configured to determine whether the particular receiver is an internal receiver or an external receiver with respect to the organization. If the particular receiver is an external receiver, a CRC code generated from the personal information and location coordinates of an external server where the plurality of files will be accessed is added to the plurality of files. A security code is also added to the plurality of files to facilitate that they are secured from being exposed and disposed at a retention time set by the organization. The system generates a custom compressed file from the plurality of files, configures it to be decompressed by the personal information of the external receiver, and sends it to the external receiver.
Compression-as-a-service for data transmissions
A compression system is disclosed. A compression service removes compression responsibilities from an application. The compression system can deploy virtual network engines to locations near the applications. The virtual network engines compress the data using a compressor selected from multiple compressors. The compressed data can then be transmitted, decompressed, and delivered to the destination.